Brute Force cracking MD5 hashes in multi threads


IAT hooking, we detect turning off the app under the desktop.


Introduction to Alternate Data Stream (ADS)


We change the date, time, and year of the files you create on your computer.

Encrypting the content of files via file infector .


We are blocking UAC (User Account Control).


By continuing the article Inline Hook DLL, today we will introduce the method of hooking code through the Import Access Table.


We are displaying the names of all active windows in Windows.


We write kernel driver - we are deleting files.


We are writing a Worm